咨询与建议

限定检索结果

文献类型

  • 682,364 篇 会议
  • 11,807 篇 期刊文献
  • 6,257 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,432 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,403 篇 工学
    • 304,443 篇 计算机科学与技术...
    • 244,193 篇 软件工程
    • 84,059 篇 信息与通信工程
    • 56,501 篇 控制科学与工程
    • 46,364 篇 电气工程
    • 36,353 篇 机械工程
    • 35,288 篇 电子科学与技术(可...
    • 35,243 篇 生物工程
    • 29,485 篇 生物医学工程(可授...
    • 21,663 篇 光学工程
    • 21,206 篇 仪器科学与技术
    • 19,255 篇 动力工程及工程热...
    • 18,192 篇 化学工程与技术
    • 15,340 篇 安全科学与工程
    • 14,327 篇 材料科学与工程(可...
    • 13,524 篇 交通运输工程
    • 13,009 篇 土木工程
  • 167,764 篇 理学
    • 93,720 篇 数学
    • 41,214 篇 物理学
    • 37,989 篇 生物学
    • 26,788 篇 统计学(可授理学、...
    • 19,395 篇 系统科学
    • 17,278 篇 化学
  • 102,840 篇 管理学
    • 66,247 篇 管理科学与工程(可...
    • 41,695 篇 图书情报与档案管...
    • 31,378 篇 工商管理
  • 24,799 篇 医学
    • 20,875 篇 临床医学
    • 19,479 篇 基础医学(可授医学...
  • 16,076 篇 法学
    • 13,055 篇 社会学
  • 14,950 篇 教育学
    • 14,325 篇 教育学
  • 12,420 篇 经济学
  • 8,631 篇 农学
  • 4,548 篇 文学
  • 1,784 篇 军事学
  • 1,543 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,009 篇 computational mo...
  • 17,971 篇 software
  • 16,196 篇 feature extracti...
  • 16,131 篇 accuracy
  • 16,123 篇 computer archite...
  • 15,859 篇 software enginee...
  • 13,745 篇 training
  • 11,247 篇 deep learning
  • 11,139 篇 data mining
  • 10,394 篇 hardware
  • 10,136 篇 machine learning
  • 9,772 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,463 篇 testing
  • 8,907 篇 costs
  • 8,836 篇 data models
  • 8,670 篇 support vector m...
  • 8,405 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,147 篇 school of comput...
  • 1,092 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 722 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 642 篇 department of co...
  • 625 篇 university of ch...
  • 586 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 502 篇 department of co...
  • 435 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 458 篇 wang wei
  • 338 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 china
  • 264 篇 li li
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 181 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,883 篇 英文
  • 22,375 篇 其他
  • 6,542 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700463 条 记 录,以下是941-950 订阅
排序:
A Three Layer Chinese Sentiment Polarity Detection Framework with Case Study  5th
A Three Layer Chinese Sentiment Polarity Detection Framework...
收藏 引用
5th international conference on Big Data and Security (ICBDS)
作者: Qiang, Mu Changjiang Nanjing Waterway Bur Nanjing 210011 Peoples R China
In terms of Chinese sentiment analysis or polarity detection, despite numerous proposed methods, they often exhibit significant language or knowledge dependencies, limiting their generality and scalability in real eng... 详细信息
来源: 评论
Using total station and spatial analyzer software to construct high precision industrial survey system  2
Using total station and spatial analyzer software to constru...
收藏 引用
2nd international conference on Electrical, Electronics, and Information engineering, EEIE 2023
作者: Guo, Yinggang Rong, Jinhong Tang, Chao Cai, Wenjiang Liang, Alimusu Zhu, Weiwei Xu, Jiaze Tao, Xirong Feng, Junying Northwest Institute of Nuclear Technology Xi'an710024 China
In order to improve the precision and efficiency of precision equipment assembly, a high-precision industrial measurement system is construction by using total station and Spatial Analyzer software. Based on the basic... 详细信息
来源: 评论
Trace-based Multi-Dimensional Root Cause Localization of Performance Issues in Microservice Systems  24
Trace-based Multi-Dimensional Root Cause Localization of Per...
收藏 引用
44th ACM/IEEE international conference on software engineering, ICSE 2024
作者: Zhang, Chenxi Dong, Zhen Peng, Xin Zhang, Bicheng Chen, Miao Fudan University China Shanghai Collaborative Innovation Center of Intelligent Visual Computing China School of Computer Science and Shanghai Key Laboratory of Data Science Fudan University China
Modern microservice systems have become increasingly complicated due to the dynamic and complex interactions and runtime environment. It leads to the system vulnerable to performance issues caused by a variety of reas... 详细信息
来源: 评论
Shifting From Syntactic to Semantics for Knowledge Exemplification Using Semantic Web (SW) Mining Techniques
Shifting From Syntactic to Semantics for Knowledge Exemplifi...
收藏 引用
2024 international conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Zaidi, Taskeen Kumar, Ajay Pundeer, Shivali Department Of Computer Science And Information Technology Bangalore India Noida Institute Of Engineering And Technology Department Of Mechanical Engineering Uttar Pradesh Greater Noida India Tula's Institute Department Of Computer Science And Engineering Dehradun India
Using Semantic Web technologies is critical to improving knowledge sharing and administrative efficiency and fostering semantic interoperability amongst healthcare information systems. This article offers a thorough e... 详细信息
来源: 评论
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1245-1257页
作者: Abeer A.Z.Ibrahim Fazirulhisyam Hashim Aduwati Sali Nor K.Noordin Keivan Navaie Saber M.E.Fadul Department of Computer and Communication Systems Engineering Faculty of EngineeringUniversiti Putra MalaysiaSerdang43400Malaysia Wireless and Photonics Networks Research Centre(WiPNET) Faculty of EngineeringUniversiti Putra MalaysiaSerdang43400Malaysia Department of Communication and Computer Engineering College of Engineering and Medical SciencesKhartoum11111Sudan School of Computing and Communications Lancaster UniversityLancasterLA14YWUnited Kingdom Department of Electrical and Electronics Engineering Faculty of EngineeringUniversiti Putra MalaysiaSerdang43400Malaysia
The deployment of distributed multi-controllers for software-Defined Networking(SDN)architecture is an emerging solution to improve network scalability and ***,the network control failure affects the dynamic resource ... 详细信息
来源: 评论
Decomposing and Measuring Trust in Open-Source software Supply Chains  46
Decomposing and Measuring Trust in Open-Source Software Supp...
收藏 引用
IEEE/ACM 46th international conference on software engineering - New Ideas and Emerging Results (ICSE-NIER)
作者: Boughton, Lina Miller, Courtney Acar, Yasemin Wermke, Dominik Kastner, Christian Coll Wooster Wooster OH 44691 USA Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ Paderborn Paderborn Germany North Carolina State Univ Raleigh NC USA
Trust is integral for the successful and secure functioning of software supply chains, making it important to measure the state and evolution of trust in open source communities. However, existing security and supply ... 详细信息
来源: 评论
Detection of a Novel Object-Detection-Based Cheat Tool for First-Person Shooter Games Using Machine Learning  21
Detection of a Novel Object-Detection-Based Cheat Tool for F...
收藏 引用
21st IEEE/ACIS international conference on software engineering Research, Management and Applications, SERA 2023
作者: Xiao, Zhang Goto, Takaaki Ghosh, Partha Kirishima, Tadaaki Tsuchida, Kensei Toyo University Graduate School of Information Sciences and Arts Saitama Japan Toyo University Faculty of Information Sciences and Arts Saitama Japan Academy of Technology Department of Computer Science and Engineering West Bengal India
Detection of novel game cheating tools is critical for ensuring fair online play. Such cheating tools are visual-based and effectively avoid detection because they do not change the data of game software. With the dev... 详细信息
来源: 评论
FPAFS: Feature Selection Using the Flower Pollination Algorithm for software Fault Detection System  4
FPAFS: Feature Selection Using the Flower Pollination Algori...
收藏 引用
4th international conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Rath, Pradeep Kumar Mahato, Susmita Singh, Niharika Gourisaria, Mahendra Kumar Das, Himansu School of Computer Science & Engineering Nist Institute of Science & Technology Berhampur India Kiit Deemed to Be University School of Computer Engineering Bhubaneswar India Kiit Deemed to Be University School of Computer Engineering Odisha Bhubaneswar India
This paper suggests a suitable feature selection (FS) approach FSFPA using flower pollination algorithm (FPA). It is based on the concept of flower pollination, to choose a set of important features or variables from ... 详细信息
来源: 评论
tl;dr: Chill, y'all: AI Will Not Devour SE
tl;dr: Chill, y'all: AI Will Not Devour SE
收藏 引用
ACM SIGPLAN international Symposium on New Ideas, New Paradigms, and Reflections on Programming and software (Onward!)
作者: Kang, Eunsuk Shaw, Mary Carnegie Mellon Univ Pittsburgh PA 15213 USA
Social media provide a steady diet of dire warnings that artificial intelligence (AI) will make software engineering (SE) irrelevant or obsolete. To the contrary, the engineering discipline of software is rich and rob... 详细信息
来源: 评论
Vulnerability Analysis Architecture Utilizing Auto Encoding Bayesian Algorithm
Vulnerability Analysis Architecture Utilizing Auto Encoding ...
收藏 引用
2023 international conference on Advancement in Computation and computer Technologies, InCACCT 2023
作者: Nayegi, D.Salangai Dhanalakshmi Roy, Soumyadip Sanjivani Darshan, J. New Horizon College of Engineering Department of Computer Science and Engineering Bangalore India
Vulnerability scanning is a process that involves using software tools to identify security weaknesses in computer systems, networks, or applications. There are various architectures that can be used for vulnerability... 详细信息
来源: 评论